UbuntuUpdates.org

Package "libudev1"

Name: libudev1

Description:

libudev shared library

Latest version: 229-4ubuntu21.31
Release: xenial (16.04)
Level: updates
Repository: main
Head package: systemd
Homepage: http://www.freedesktop.org/wiki/Software/systemd

Links


Download "libudev1"


Other versions of "libudev1" in Xenial

Repository Area Version
base main 229-4ubuntu4
security main 229-4ubuntu21.27

Changelog

Version: 229-4ubuntu21.22 2019-07-04 10:07:23 UTC

  systemd (229-4ubuntu21.22) xenial; urgency=medium

  [ Dan Streetman ]
  * d/t/systemd-fsckd, d/t/cmdline-upstart-boot:
    - skip on s390x; requires grub (LP: #1830477)
  * d/p/ask-password-prevent-buffer-overrow-when-reading-fro.patch:
    - prevent buffer overflow when reading keyring (LP: #1814373)

  [ Dimitri John Ledkov ]
  * Specify Ubuntu's Vcs-Git

  [ Balint Reczey ]
  * Append /snap/bin to default PATH.
    Snapd ships snapd-env-generator, but systemd does not not support
    environment generators. Hard-coding /snap/bin is less risky than
    backporting environment generator support and since snaps are considered
    to be first class packages on Ubuntu /snap/bin can safely added to
    the default PATH. (LP: #1771858)

  [ Ioanna Alifieraki ]
  * d/p/systemctl-Replace-check_one_unit-by-get_state_one_un.patch
    - Backport upstream PR#2768 needed for next patch
  * d/p/systemctl-load-unit-if-needed-in-systemctl-is-active.patch
    - Backport upstream PR#7997 to fix alias service reports inactive while
      aliased is active (LP: #1828892)

 -- Dan Streetman <email address hidden> Wed, 24 Apr 2019 17:15:36 -0400

Source diff to previous version
1830477 systemd-fsckd, cmdline-upstart-boot tests fail on xenial s390x
1771858 /snap/bin not in default PATH for units, snapd should ship system-environment-generators to inject /snap/bin into $PATH
1828892 systemctl - alias service reports inactive while aliased is active

Version: 229-4ubuntu21.21 2019-04-08 13:06:19 UTC

  systemd (229-4ubuntu21.21) xenial-security; urgency=medium

  * SECURITY UDPATE: Unsafe environment usage in pam_systemd.so leads to
    incorrect Policykit authorization
    - debian/patches/CVE-2019-3842.patch: Use secure_getenv() rather than
      getenv() in pam_systemd.c
    - CVE-2019-3842

 -- Chris Coulson <email address hidden> Fri, 29 Mar 2019 16:43:00 +0000

Source diff to previous version
CVE-2019-3842 RESERVED

Version: 229-4ubuntu21.19 2019-04-04 17:07:22 UTC

  systemd (229-4ubuntu21.19) xenial; urgency=medium

  [ Michael Vogt ]
  * d/p/fix-race-daemon-reload-11121.patch:
    - backport systemd upstream PR#8803 and PR#11121 to fix race
      when doing systemctl and systemctl daemon-reload at the
      same time LP: #1819728

  [ Balint Reczey ]
  * d/p/virt-detect-WSL-environment-as-a-container.patch:
    - virt: detect WSL environment as a container (LP: #1816753)

 -- Michael Vogt <email address hidden> Mon, 25 Mar 2019 16:04:56 +0100

Source diff to previous version
1819728 Please backport \
1816753 do-release-upgrade on WSL failed horribly due to grub and others

Version: 229-4ubuntu21.17 2019-03-11 20:06:49 UTC

  systemd (229-4ubuntu21.17) xenial; urgency=medium

  [ Victor Tapia ]
  * d/p/stop-mount-error-propagation.patch:
    keep mount errors local to the failing mount point instead of blocking
    the processing of all mounts (LP: #1755863)

  [ Eric Desrochers ]
  * d/p/fix-egde-case-when-processing-proc-self-mountinfo.patch:
    Mounting any file system to a mount point in a directory
    that is bind mounted to itself will create an inactive
    mount unit. (LP: #1795764)

 -- Dan Streetman <email address hidden> Thu, 28 Feb 2019 17:50:50 -0500

Source diff to previous version
1755863 netbooting the bionic live CD over NFS goes straight to maintenance mode :
1795764 systemd: core: Fix edge case when processing /proc/self/mountinfo

Version: 229-4ubuntu21.16 2019-02-18 17:07:02 UTC

  systemd (229-4ubuntu21.16) xenial-security; urgency=medium

  * SECURITY UPDATE: denial of service via crafted dbus message
    - debian/patches/CVE-2019-6454.patch: sd-bus: enforce a size limit for
      dbus paths, and don't allocate them on the stack
    - debian/patches/sd-bus-if-we-receive-an-invalid-dbus-message-ignore-.patch:
      sd-bus: if we receive an invalid dbus message, ignore and proceeed
    - CVE-2019-6454

  * Do not remove multiple spaces after identifier in syslog message
    - add debian/patches/journal-do-not-remove-multiple-spaces-after-identifi.patch

 -- Chris Coulson <email address hidden> Wed, 13 Feb 2019 22:03:22 +0000

CVE-2019-6454 systemd (PID1) crash with specially crafted D-Bus message



About   -   Send Feedback to @ubuntu_updates